The Trivy Supply Chain Compromise: A Technical Post-Mortem

The compromise relied on a calculated, multi-stage execution that began with a stealthy injection into entrypoint.sh, allowing the malicious payload…